Windows Networking Flashcards

1
Q

LAN

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WWAN

A

Wireless Wide Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network connection types (4)

A

1) Wired connections
2) Wireless Connections
3) WWAN Connections
4) VPN Connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Local Area Network is also known as a what?

A

Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What environments are Intranets typically used in?

A

Large businesses & SOHO environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Connection type that connects directly into a network interface card

A

Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Connection that uses a Cat 5, Cat 6, Cat 7, or Cat 8 connector using a UTP (Unshielded Twisted Pair) or STP (Shielded Twisted Pair)) cable

A

Copper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WOL

A

Wake On Lan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Connection that connects to a wide area network over a wireless connection, and is most commonly seen with cellular modems or cellular hotspots

A

WWAN connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If you hit your data cap on your wwan service providers plan, what are the 2 things that could happen?

A

1) Overage Fees
2) Throttling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Any type of network connection where you want to set a data limit to, and you can then measure that data limit to ensure you’re not going over the cap set by your service provider.

A

Metered Connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Connection used to connect anyone or any resources from one private network to another over a public network.

A

VPN connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 4 main required configurations that a network adaptor needs?

A

1) IP address
2) Subnet mask
3) (Default) Gateway
4) DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Any kind of device that acts as a gateway between the client PC and the Internet

A

Proxy Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why use a Proxy Server? (3)

A

1) See what things people are accessing
2) Content filtering
3) Cache pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following network configurations is used to identify your computer’s individual host identifier and your computer’s network identifier?

a) WINS
b) Gateway
c) DNS
d) Subnet mask

A

d) Subnet mask

The subnet mask is used to identify the host identifier and the network identifier uniquely in combination with the IP address. The subnet mask is used by the TCP/IP protocol to determine whether a host is on the local subnet or a remote network.

17
Q

Tim connects his Windows 10 laptop to his office’s wireless network to print out a report for his boss. Which type of network should he select to discover the printer on the office’s wireless network?

a) Public
b) Private
c) Home
d) Work

A

b) Private

Tim should select the private network type when connecting to the wireless network in his office so that he can access the networked printer. A private network is considered trusted, allows the computer to be discoverable to other devices on the network, and supports the use of file and printer sharing. In older versions of Windows, there were also Home and Work network types, but those have since been merged into public and private network types, as well.

18
Q

Jason is out of town on a business trip and needs to access the share drive on his company’s corporate network. Which of the following types of network connections should he use to access the share drive from his hotel room?

a) Dial-up
b) VPN
c) Wired
d) Wireless

A

b) VPN

The user must connect remotely through a VPN to access the company’s shared drive and shared resources. The VPN connection is established over a wired, wireless, cellular, or dial-up connection, but Jason will not access the corporate resources without first authentication through the VPN. A virtual private network creates a secure tunnel between two endpoints connected via an insecure network such as the Internet. VPNs use encryption software is used to ensure the privacy of data as messages transit through the public network.